Sciweavers

366 search results - page 46 / 74
» A Survey of Models and Design Methods for Self-organizing Ne...
Sort
View
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 2 months ago
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory
— A formal methodology for the analysis of a closed loop clock distribution and active deskewing network is proposed. In this paper an active clock distribution and deskewing net...
Vinil Varghese, Tom Chen, Peter Michael Young
HICSS
2005
IEEE
160views Biometrics» more  HICSS 2005»
14 years 2 months ago
Using Content and Process Scaffolds to Support Collaborative Discourse in Asynchronous Learning Networks
Discourse, a form of collaborative learning [44], is one of the most widely used methods of teaching and learning in the online environment. Particularly in large courses, discour...
I. Wong-Bushby, Starr Roxanne Hiltz, Michael Biebe...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 2 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
IEICET
2010
76views more  IEICET 2010»
13 years 7 months ago
Planar Waveguide Arrays for Millimeter Wave Systems
Design of high gain and high efficiency antennas is one of the key challenges in antenna engineering and especially in millimeter wave communication systems. Various types of plan...
Makoto Ando
SAC
2004
ACM
14 years 2 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...